Hi, I did some quick testing, it`s a little old on updates, but working.
I apologize for my bad english. I have removed timestamps from logs. -PF server version: 11.0.0 -Unifi Controller: 6.5.55 on Debian -UAP/AP Model: UAP-AC-Pro -UAP/AP Firmware: 6.6.55.15189 -Switch config on PF: IP ADDRESS: "UAP_ip_address" MAC ADDRESS: 18:e8:29:66:XX:XX Type: Ubiquiti:Unifi Deauthentication Method: RADIUS Use CoA: Yes Radius, secret Passohrase: "your_passphrase" Roles by VLAN ID as needed -SSID: "regtest", MAC-AUTH, radius assigned VLAN. -Client Device: Windows 10 Laptop MAC address: f8:59:71:c4:XX:XX -Client connects first, as unreg condition and no role: -Not registered, placed in reg vlan: pf packetfence_httpd.aaa[1279776]: httpd.aaa(2354) INFO: [mac:f8:59:71:c4:XX:XX] handling radius autz request: from switch_ip => (192.168.96.XX), connection_type => Wireless-802.11-NoEAP,switch_mac => (18:e8:29:67:XX:XX), mac => [f8:59:71:c4:XX:XX], port => 0, username => "f8:59:71:c4:XX:XX", ssid => regtest (pf::radius::authorize) pf packetfence_httpd.aaa[1279776]: httpd.aaa(2354) INFO: [mac:f8:59:71:c4:XX:XX] Instantiate profile IBERA-TEST (pf::Connection::ProfileFactory:_from_profile) pf packetfence_httpd.aaa[1279776]: httpd.aaa(2354) INFO: [mac:f8:59:71:c4:XX:XX] is of status unreg; belongs into registration VLAN (pf::role::getRegistrationRole) pf packetfence_httpd.aaa[1279776]: httpd.aaa(2354) INFO: [mac:f8:59:71:c4:XX:XX] (192.168.96.XX) Added VLAN 102 to the returned RADIUS Access-Accept (pf::Switch::returnRadiusAccessAccept) -Client proceeds with portal auth, is registered and placed in "guest" vlan: pf packetfence_httpd.aaa[1279776]: httpd.aaa(2354) INFO: [mac:f8:59:71:c4:XX:XX] Username was defined "f8:59:71:c4:XX:XX" - returning role 'guest' (pf::role::getRegisteredRole) pf packetfence_httpd.aaa[1279776]: httpd.aaa(2354) INFO: [mac:f8:59:71:c4:XX:XX] PID: "default", Status: reg Returned VLAN: (undefined), Role: guest (pf::role::fetchRoleForNode) pf packetfence_httpd.aaa[1279776]: httpd.aaa(2354) INFO: [mac:f8:59:71:c4:XX:XX] (192.168.96.XX) Added VLAN 100 to the returned RADIUS Access-Accept (pf::Switch::returnRadiusAccessAccept) I'm not sure, but i think CoA is implemented on AP firmware, as on a UAP/AP "running config": aaa.radius.dad.status=enabled aaa.radius.dad.port=3799 aaa.1.radius.das.status=enabled aaa.1.radius.das.port=3801 aaa.1.radius.dad.status=enabled As UNIFI is not supporting the old UI anymore, and, in the new UI CoA is not implemented, I think is possible to provision UAPs via config text file on controller side, but have not tested: https://gist.github.com/modest/d6ffb2cdd5e38b213f24c29be38e3b1d Not sure if this is possible on new controller versions, as I'm a little behind on that. But CoA is working on this test env: firmware/versions ecosystem. Or maybe on new Unifi network software, CoA is enabled when Radius profile is created? PF side: (7) Disconnect-Request Id 1 ens192:10.100.0.2:46904 -> 192.168.96.XX:3799 +10.748 Calling-Station-Id = "F8-59-71-C4-56-3F" NAS-Identifier = "18e829677602" Authenticator-Field = 0x776e35f33d6376547f3c57e46402ea49 (9) Disconnect-ACK Id 1 ens192:10.100.0.2:46904 <- 192.168.96.XX:3799 +10.764 +0.016 Event-Timestamp = "Feb 22 2024 19:11:43 -03" Message-Authenticator = 0xa5a19f1c4f9c253ca6bfce2033d74a3c Authenticator-Field = 0x5384dccc7ce36e404d3ea859b818793b UAP side: IP pf.your-server.com.ar.53203 > 192.168.96.XX.3799: RADIUS, Disconnect-Request (40), id: 0x7d length: 53 IP pf.your-server.com.ar.53203 > 192.168.96.XX.3799: RADIUS, Disconnect-Request (40), id: 0x7d length: 53 IP 192.168.96.XX.3799 > pf.your-server.com.ar.53203: RADIUS, Disconnect-ACK (41), id: 0x7d length: 44 IP pf.your-server.com.ar.50594 > 192.168.96.XX.3799: RADIUS, Disconnect-Request (40), id: 0x72 length: 53 IP pf.your-server.com.ar.50594 > 192.168.96.XX.3799: RADIUS, Disconnect-Request (40), id: 0x72 length: 53 IP 192.168.96.XX.3799 > pf.your-server.com.ar.50594: RADIUS, Disconnect-ACK (41), id: 0x72 length: 44 IP 192.168.96.XX.3799 > pf.your-server.com.ar.50594: RADIUS, Disconnect-ACK (41), id: 0x72 length: 44 I will be out for a few weeks, but i'm glad to help on integrating Unifi and Mikrotik with PF, and keep support alive. I also have spare HW, to perform some testing, maybe I could get an U6 new gen Unifi UAP or a Mikrotik CAP AX too. I can also spare some cloud resources to run new PF versions along with new UNIFI/MIKROTIK software. Enrique El vie, 16 feb 2024 a las 23:44, Lucas Guimaraes (<lucas.guimar...@kavak.com>) escribió: > Hi Enrique, > > Yes, switching to the legacy interface, we can see the Radius CoA (Beta > for ages hehehe) in the SSID as soon as you enable the Radius option. > However, even if you enable this feature on Unifi Controller, the issue > "Can't login on the Unifi controller: 404 Not Found '' is still there. > Consequently, the device which is trying to go out to the internet is still > stuck inside of the portal. > > In other words, even with CoA on from Unifi, the deauthentication doesn't > work. At that point, pf tries to send a command to the Unifi Controller but > it doesn't respond. > > Also, I've tried to do with all the methods of deauthentication in pf > available instead and none of them has worked either with the latest > firmware stable in Unifi Controller or Network software. I was putting my > faith in Radius deauthentication in pf to see if that works too with web > auth enabled as we know Radius works in Unifi but it still shows the same > error yet. > > It's kind frustrating tbh :/ > > I hope someday any dev from pf / unifi could help us with that. > > I think many people are looking forward to that ^^ > > On Fri, 16 Feb 2024, 08:17 Enrique Gross via PacketFence-users, < > packetfence-users@lists.sourceforge.net> wrote: > >> Hi Mike, Hi Lucas >> >> I have read somewhere that there were issues with web authentication >> and Unifi appliances like UDM. I remember configuring web auth but I >> now use RADIUS CoA and it works well. I admit I'm a few versions >> behind on my Unifi controller, and this double UI issue is kind of a >> headache. But the CoA option is still there on the UI on Unifi >> controller 8.X when you switch to the old one, does the config don't >> provision anymore? >> >> Enrique >> >> >> _______________________________________________ >> PacketFence-users mailing list >> PacketFence-users@lists.sourceforge.net >> https://lists.sourceforge.net/lists/listinfo/packetfence-users >> > > > > > AVISO DE CONFIDENCIALIDAD > Este mensaje de correo electrónico y sus adjuntos pueden contener > información confidencial o legalmente privilegiada y está destinado > únicamente al uso de los destinatarios. Esta prohibido a las personas o > entidades que no sean los destinatarios de este correo cualquier tipo de > modificación, copia, distribución, divulgación, retención o uso de la > información que contiene. La divulgación no autorizada, difusión, > distribución, copia o la adopción de cualquier acción basada en la > información aquí contenida, está prohibida. No puede garantizarse que los > correos electrónicos estén libres de errores, ya que pueden ser interceptados, > enmendados o contener virus. Cualquier persona que se comunique con > nosotros por correo electrónico se considera que ha aceptado estos riesgos. > El Propietario de los datos no se hace responsable de errores u omisiones > en este mensaje y niega cualquier responsabilidad por cualquier daño que > surja del uso del correo electrónico y no se responsabiliza por su uso > abusivo, contrario a la moral, a las buenas costumbres o a la ley, o > realizado fuera de las competencias laborales del autor del mail. > CONFIDENTIALITY NOTICE > This e-mail message and any attachments may contain confidential or > legally privileged information and is intended only for the use of the > intended recipient(s). Any unauthorized disclosure, dissemination, > distribution, copying or any action in reliance on the information herein > is prohibited. It is prohibited to persons or entities that are not the > recipient(s) of this email any modification, copying, distribution, > disclosure, retention or use of the information contained therein. E-mails > are not secure and cannot be guaranteed to be error free as they can be > intercepted, amended, or contain viruses. Anyone who communicates with us > by e-mail is deemed to have accepted these risks. The Data Owner is not > responsible for errors or omissions in this message and denies any > responsibility for any damage arising from the use of e-mail. Any opinion > and other statement contained in this message and any attachment are solely > those of the author and do not necessarily represent those of the company. > -- [image: Imágenes integradas 1]
_______________________________________________ PacketFence-users mailing list PacketFence-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/packetfence-users